A wireless analyzer device for an ieee 802.11 wireless LAN is programmed to perform both a per packet processing routine to obtain packet statistics, and a one second timer routine, followed by arranging the packet statistics in a logical manner for display on a computer monitor.
|
1. A method for operating and programming a wireless analyzer device for an ieee 802.11 wireless LAN, said method comprising the steps of:
performing a per packet processing routine to obtain packet statistics; performing a one second timer routine; arranging the packet statistics in a logical manner for display on a computer monitor; wherein said step of per packet processing routine includes the steps of: acquiring out of band packet information; acquiring packet data; determining whether wired equivalent privacy (wep) is enabled; decrypting a data portion of a captured frame and validating a wep integrity check value (ICV), in response to enablement of wep; and processing packet statistics either in response to disablement of wep, or to decryption of the data portion of a frame. 17. A method for operating and programming a wireless analyzer device for an ieee 802.11 wireless LAN, said method comprising the steps of:
performing a per packet processing routine to obtain packet statistics; performing a one second timer routine; arranging the packet statistics in a logical manner for display on a computer monitor; wherein said one second timer routine includes the steps of: calculating network utilization; calculating data packet throughput; and calculating per second statistics; wherein said step of calculating networks utilization includes the steps of: determining if TOTAL_PACKET_MICROSECONDS is non-zero, indicating packets were received in the previous second; calculating, in response to Yes for the previous determining step, the previous 1 second network utilization by dividing 1,000,000 into TOTAL_PACKET_MICROSECONDS, and multiplying the result by 100 to provide percent utilization; resetting TOTAL_PACKET_MICROSECONDS to zero, after completing said calculating step; and terminating the step of calculating network utilization, either in response to said determining step showing TOTAL_PACKET_MICROSECONDS is zero, or immediately after said resetting step. 18. A method for operating and programming a wireless analyzer device for an ieee 802.11 wireless LAN, said method comprising the steps of:
performing a per packet processing routine to obtain packet statistics; performing a one second timer routine; arranging the packet statistics in a logical manner for display on a computer monitor; wherein said one second timer routine includes the steps of: calculating network utilization; calculating data packet throughput; and calculating per second statistics; wherein said step of calculating data packet throughput includes the steps of: determining if TOTAL_DATAPACKET_BYTES is non-zero indicating at least some of received packets are data Packets in the ieee 802.11 frame Control Field (FCF); calculating, in response to Yes in the previous determining step, the previous 1 second data throughput by multiplying the total number of bytes by 8 to obtain the total number of bits transmitted in the previous second; resetting, after said calculating step, the TOTAL_DATAPACKET_BYTES to zero; and terminating said step of calculating data packet throughput either after said resetting step, or said determining step finding TOTAL_DATAPACKET_BYTES is zero. 19. A method for operating and programming a wireless analyzer device for an ieee 802.11 wireless LAN, said method comprising the steps of:
performing a per packet processing routine to obtain packet statistics; performing a one second timer routine; arranging the packet statistics in a logical manner for display on a computer monitor; wherein said one second timer routine includes the steps of: calculating network utilization; calculating data packet throughput; and calculating per second statistics; wherein said step of calculating per second statistics provides errors and packets per second, and includes the steps of: determining if the variable ERRORS_THIS_SECOND is unequal to zero; setting, in response to Yes in the previous step, the last ERRORS_PER_SECOND value to equal the variable ERRORS_THIS_SECOND; resetting the ERRORS_THIS_SECOND to zero in response to either said setting step, or to the last said determining step answer being No; determining if the variable PACKET_THIS_SECOND is non-zero; setting, in response to the PACKET_THIS_SECOND being non-zero, the value of the variable PACKETS_THIS_SECOND; and resetting the PACKETS_PER_SECOND to zero, in response to either the immediately preceding setting step, or to No in the immediately preceding determining step. 2. The method of
reading the packet length in bytes; reading the packet status relative to the associated cyclic redundancy code (CRC) and short preamble; reading the packet physical layer convergence protocol (PLCP) service field; reading the packet PLCP signal field; and reading the packet duration.
3. The method of
calculating network utilization; calculating data packet throughput; and calculating per second statistics.
4. The method of
accumulating general statistics; accumulating size distribution; accumulating detail errors; accumulating packet physical layer convergence protocol (PLCP) header statistics; and accumulating ieee 802.11 statistics.
5. The method of
accumulating packet length into TOTAL_BYTES; incrementing total PACKETS; incrementing PACKETS_THIS_SECOND; incrementing packet duration into total packet Duration; determining whether a frame is multicast; determining whether the frame is Broadcast; incrementing MULTICAST_PKTS if the frame is Multicast and not Broadcast; and incrementing BROADCAST_PKTS if the frame is Broadcast.
6. The method of
determining whether the frame length is less than 14 bytes, and if so increment UNDERSIZE_PKTS; determining in response to the frame length being greater than or equal to 14 bytes, whether the frame length is less than 64 bytes, and if so increment total--14--63_PKTS; determining, in response to the frame being greater than or equal to 64 bytes, whether the frame length is less than 128 bytes, and if so increment total--64--127_PKTS; determining, in response to the frame length being equal to or greater than 128 bytes, whether the frame length is less than 256 bytes, and if so increment total--128--255_PKTS; and accumulating size distribution 2 in response to the frame length being equal to or greater than 256 bytes.
7. The method of
determining whether the frame length is less than 512 bytes, and if so increment total--252--511_PKTS; determining, in response to the frame length being greater than or equal to 512 bytes, whether the frame length is less than 1024 bytes, and if so increment total--512--1023_PKTS; determining, in response to the frame length being equal to or greater than 1024 bytes, whether the frame length is less than 2048 bytes, and if so increment total--1024--2047_PKTS; determining, in response to the frame length being equal to or greater than 2048 bytes, whether the frame length is greater than 2346 bytes, and if so increment total--2048--2346_PKTS; and incrementing OVERSIZE_PKTS in response to the frame length being equal to or greater than 2346 bytes.
8. The method of
determining if a frame error is cyclic redundancy code (CRC), and if so increment both TOTAL_CRC_ERRS, and ERROR_THIS_SECOND; determining, in response to a frame error not being CRC, whether a frame error is physical layer convergence protocol (PLCP), and if so increment both total PLCP ERRS, and ERRORS THIS second; determining, in response to a frame error not being PLCP, whether a frame needs decryption; and determining, in response to a frame needing decryption, whether there was a wep ICV error during decryption, and if so increment both TOTAL_WEPICV_ERRS, and ERRORS_THIS_SECOND.
9. The method of
determining if a frame signal is transmitted at a speed of 1 Mbps Barker Code, and if so, increment total--1 MBPS_PKTS; determining, in response to the frame not being a 1 Mbps frame, if the frame is a 2 Mbps Barker Code frame, and if so, increment total--2 MBPS_PKTS; determining, in response to the frame not being a 2 Mbps Barker Code frame, if the frame is a 5.5 Mbps CCK frame, and if so, increment total--5--5 MBPS_PKTS; determining, in response to the frame not being a 5.5 Mbps CCK frame, if the frame is an 11 Mbps CCK frame, and if so, increment total--11 MBPS_PKTS; and accumulating PLCP Header Statistics 2.
10. The method of
determining is a frame PLCP is a short PLCP, and if so, increment TOTAL_SHORT_PLCPS; determining, in response to the frame not being a short PLCP, if the frame is a long PLCP, and if so, increment TOTAL_LONG_PLCPS; and accumulating frame duration into TOTAL_PACKET_MICROSECONDS.
11. The method of
determining if the frame control field wired equivalent privacy (FCF.wep) is set, and if so, increment the variable TOTAL_WEP_PKTS; determining if the FCF.RETRY is set, and if so, increment the variable TOTAL_RETRY_PKTS; determining if the FCF.ORDER is set, and if so, increment the variable TOTAL_ORDER_PKTS; and accumulating ieee 802.11 packet data Statistics 2.
12. The method of
determining if the frame control field type (FCF.TYPE) contains a value indicating that the ieee 802.11 frame is a data frame; responding to the FCF.TYPE being data, by successively incrementing TOTAL_DATA_PKTS, and accumulating packet Length into TOTAL_DATAPACKET_BYTES; determining, in response to the FCF.TYPE not being data, if the FCF.TYPE is Management; responding to the FCF.TYPE being Management, by successively incrementing TOTAL_MGMT_PKTS, and accumulating ieee 802.11 Management Statistics; determining, in response to the FCF.TYPE not being Management, if the FCF.TYPE is Control; and responding to the DCF.TYPE being Control, by successively incrementing TOTAL_CTRL_PKTS, and accumulating ieee 802.11 Control Statistics.
13. The method of
determining if the FCF.SUBTYPE is a Power Save Poll (PS-POLL), and if so, increment TOTAL_PSPOLL_PKTS; determining in response to the FCF.SUBTYPE not being PS-POLL, if the FCF.SUBTYPE is an Acknowledgment (ACK), and if so, increment total-ACK_PKTS; determining, in response to the FCF.SUBTYPE not being ACK, if it is a Request To Send (RTS), and if so, increment TOTAL_RTS_PKTS; determining, in response to the FCF,SUBTYPE not being RTS, if it is a Clear To Send (CTS), and if so, increment TOTAL_CTS_PKTS; determining, in response to the FCF.SUBTYPE not being CTS, if it is a contention Free End (CF-END), and if so, increment TOTAL_CFEND_PKTS; and determining in response to the FCF.SUBTYPE not being CF END, if it is CF END/CFACK, and if so, increment TOTAL_CFEND_CFACK_PKTS.
14. The method of
determining if the frame Control Field Subtype is an Association Request (FCF.SUBTYPE ASSOC REQ), and if so, increment TOTAL_ASSOC_REQS; determining, in response lo the FCF.SUBTYPE not being ASSOC REQ, if it is an Association Response (ASSOC RESP), and if so, increment TOTAL_ASSOC_RESP; determining, in response to the FCF.SUBTYPE not being an ASSOC RESP, if it is a Reassociation Response (REASSOC RESP), and if so, increment TOTAL_REASSOC_RESP; and accumulating Management packet Statistics 2 in response to the FCF.SUBTYPE not being a REASSOC RESP.
15. The method of
determining if the FCF.SUBTYPE is an Authentication, and if so, increment TOTAL_AUTH_REQS; determining, in response to No for the previous step, if the FCF.SUBTYPE is a Deauthentication, and if so, increment TOTAL_DEAUTH_REQS; determining, in response to No for the immediately previous step, if the FCF.SUBTYPE is a PROBE REQ, and if so, increment TOTAL_PROBE_REQS; determining, in response to No for the immediately previous step, if the FCF.SUBTYPE is a PROBE RESP, and if so, increment TOTAL_PROBE_RESP; and accumulating Management packet Statistics 3, in response to the FCF.SUBTYPE not being a PROBE RESP.
16. The method of
determining if the FCF.SUBTYPE is a Disassociation, and if so, increment TOTAL_DISASSOCATIONS; determining, in response to No for the previous step, if the FCF.SUBTYPE is an announcement traffic indication message (ATIM), and if so, increment TOTAL_ATIM_PKTS; and determining, in response to No for the immediately previous step, if the FCF.SUBTYPE is a Beacon, and if so, both successively increment TOTAL_BEACON_PKTS, and then extract Extended Service Set Identification (ESSID) and Basic Service Set identification (BSSID).
|
This Application is related to Ser. No. 09/875,544, filed Jun 6, 2001, for "Method and Apparatus For Filtering That Specifies The Types Of Frames To Be Captured And To Be Displayed For An IEEE 802.11 Wireless LAN," the teachings of which are incorporated herein to the extent that they do not conflict herewith. The related Application, and the present Application have the same Assignee.
The field of the present invention relates generally to wireless networks, and more specifically to methods for operating wireless analyzers for wireless networks.
Wireless networks for allowing computer users to communicate with one another in a wireless manner are being implemented on an ever increasing basis. One example of such a network is that based upon an IEEE 802.11 Wireless LAN (Local Area Network) Topology. Also, wireless networks have been expanded for use in wide area networks, and the Internet. Through the use of cell phone technology, cell phones are now being offered with the built-in capability to permit one to access the Internet directly from the cell phone.
Wireless networks, as with any communication system, can develop defects interfering with error communication between users, and even preventing communication between the wireless network users. Accordingly, it is necessary to provide tools for analyzing defects that occur at any given time in a wireless network. Fortunately, an international standard has been agreed upon in relation to information technology associated with telecommunications and information exchange between systems, including local and metropolitan area networks. The international standard is ISO/IEC 8802-11, and better known for LANs under ANSI./IEEE Standard 802.11. The provisions of this standard are incorporated herein by reference, to the extent they do not conflict herewith.
Various tools have been developed for permitting troubleshooters to analyze traffic or communications over a wireless network. For example, Networks Associates Technology, Inc., Santa Clara, Calif., has developed an analyzer known as "Sniffer® Wireless". The present inventors recognized that analyzers such as the Sniffer® Wireless can be improved by providing the capability to visually inspect vital statistical data associated with the wireless network, such as wireless LAN IEEE 802.11 Topology. They recognized that if the data is processed in a logical manner for presentation on a display, analyzers providing this function will permit troubleshooters to recognize and correct communication problems occurring in the wireless network. Also, through use of such displays in an analyzer, a troubleshooter will be able to more readily eliminate excessive overlap, and better recognize areas in the network that are not presently covered by access points (AP).
The present invention provides a method for programming an analyzer for a wireless network, such as a Sniffer® Wireless to capture information for each frame received via packets captured from a wireless network for the purpose of accumulating statistical information relative to the wireless network being analyzed. Means are provided for analyzing the frame data contents, and collecting other information obtained by the associated hardware in capturing or receiving data frames traveling in the Wireless Network. The invention includes programming means for arranging the statistical information into a logical presentation for display.
Various embodiments of the present invention are described herein with reference to the drawings, in which like items are identified by the same reference designation, wherein:
The acronyms used herein are well known to those of ordinary skill. For example, WEP, PLCP, NAI, BSSID, and ESSID stand for: wired equivalent privacy, physical layer convergence protocol, Network Associates, Inc., basic service set identification, and extended service set identification, respectively.
With reference to
The present invention is described for use with networks formatted in accordance with IEEE Specification for 802.11 and 802.11b networks. The following Table 1 shows how the aforesaid standard defines specific frame types, the subtypes under each frame type, and the IEEE Specification location for each frame subtype.
TABLE 1 | ||
IEEE Specification | ||
Frame Type | Frame Sub Type | Location |
CONTROL | ACK | [1] IEEE 7.2.1.3 |
CTS | [1] IEEE 7.2.1.2 | |
RTS | [1] IEEE 7.2.1.1 | |
PS-POLL | [1] IEEE 7.2.1.4 | |
CF-END | [1] IEEE 7.2.1.5 | |
CF-END/CF-ACK | [1] IEEE 7.2.1.6 | |
MANAGEMENT | ASSOCIATION REQUEST | [1] IEEE 7.2.3.4 |
ASSOCIATION RESPONSE | [1] IEEE 7.2.3.5 | |
REASSOCIATION REQUEST | [1] IEEE 7.2.3.6 | |
REASSOCIATION RESPONSE | [1] IEEE 7.2.3.7 | |
PROBE REQUEST | [1] IEEE 7.2.3.8 | |
PROBE RESPONSE | [1] IEEE 7.2.3.9 | |
BEACON | [1] IEEE 7.2.3.1 | |
ATIM | [1] IEEE 7.2.3.2 | |
DISASSOCIATION | [1] IEEE 7.2.3.3 | |
AUTHENTICATION | [1] IEEE 7.2.3.10 | |
DEAUTHENTICATION | [1] IEEE 7.2.3.11 | |
DATA | DATA | [1] IEEE 7.2.2 |
The IEEE Specifications for 802.11 and 802.11b define specific frame attributes for frames transmitted on a given network. The Sniffer® Wireless is designed to receive the data associated with the frame attributes, and classify the same. The "Frame Attributes", and their description, and LOCATION relative to the IEEE Specification, are shown below in Table 2, as follows:
TABLE 2 | ||
IEEE | ||
Frame Attribute | Description | Specification |
(FIRST PORTION) | ||
Retry | The 802.11 MAC Header contains a bit in the Frame | [1] 7.1.3.1.6 |
Control Field indicating that the current frame was | ||
retransmitted by the transmitter due to a failure to receive an | ||
acknowledgment from the receiving station. | ||
WEP | The 802.11 MAC Header contains a bit in the Frame | [1] 7.1.3.1.9 |
Control Field indicating that the current frame data field is | ||
encrypted using WEP encryption. | ||
Order | The 802.11 MAC Header contain a bit in the Frame Control | [1] 7.1.3.1.10 |
Field indicating that the current frame belongs in the strictly | ||
ordered class. | ||
Short PLCP | The 802.11 Specification indicates that a preamble field | [2] 18.2.2.2 |
shall be transmitted prior to transmitting packet data. This | ||
preamble/PLCP contains a specific pattern useful for | ||
receiver synchronization. The 802.11b Specification offers | ||
the option that stations can transmit a shorter | ||
preamble/PLCP header. The duration of this shorter | ||
preamble/PLCP header occupies 96 microseconds of link. | ||
(SECOND PORTION) | ||
Long PLCP | The 802.11 Specification indicates that a preamble field | [2] 18.2.2.1 |
shall be transmitted prior to transmitting packet data. This | ||
preamble/PLCP contains a specific pattern useful for | ||
receiver synchronization. The original 802.11 | ||
Specification indicates that the duration of the Long | ||
PLCP/preamble occupies 192 microseconds of link. | ||
1 Mbps | The 802.11 Specification indicates that the PLCP Header of | [2] 18.2.3.3 |
a frame defines the speed at which the data field is | ||
transmitted. Under certain RF environment conditions, the | ||
transmitter will select which speed to transmit each packet. | ||
The available speeds for transmitting the data field of a | ||
packet are 1, 2, 5.5 and 11 Mbps. | ||
2 Mbps | The 802.11 Specification indicates that the PLCP Header of | [2] 18.2.3.3 |
a frame defines the speed at which the data field is | ||
transmitted. Under certain RF environment conditions, the | ||
transmitter will select which speed to transmit each packet. | ||
The available speeds for transmitting the data field of a | ||
packet are 1, 2, 5.5 and 11 Mbps. | ||
5.5 Mbps | The 802.11 Specification indicates that the PLCP Header of | [2] 18.2.3.3 |
a frame defines the speed at which the data field is | ||
transmitted. Under certain RF environment conditions, the | ||
transmitter will select which speed to transmit each packet. | ||
The available speeds for transmitting the data field of a | ||
packet are 1, 2, 5.5 and 11 Mbps. | ||
(THIRD PORTION) | ||
11 Mbps | The 802.11 Specification indicates that the PLCP Header of | [2] 18.2.3.3 |
a frame defines the speed at which the data field is | ||
transmitted. Under certain RF environment conditions, the | ||
transmitter will select which speed to transmit each packet. | ||
The available speeds for transmitting the data field of a | ||
packet are 1, 2, 5.5 and 11 Mbps. | ||
CRC Error | The 802.11 Specification indicates that the data field of a | [1] 7.1.3.6 |
802.11 frame will use a 32 bit Frame Check Sequence field | ||
that performs an integrity check on the data field to detect | ||
that a receiver has received a frame free of errors. | ||
PLCP Error | The 802.11 Specification indicates that the PLCPO field of | [2] 18.2.3.6 |
an 802.11 frame will use a 16 bit Frame Check Sequence | ||
field that performs an integrity check on the 4 Byte PLCP | ||
header to insure that a receiver has received a PLCP header | ||
free of errors. | ||
WEP ICV Error | The 802.11 Specification indicates that when WEP | [1] 8.2.5 |
Encryption is used, an Integrity Check Value on the | ||
Encrypted data frame be used to insure the integrity of the | ||
encrypted payload of that WEP frame. | ||
PLCP Length Field | The 802.11 Specification indicates within the PLCP header | [2] 18.2.3.5 |
the total number of microseconds for which the 802.11 | ||
MPDU occupies the link. | ||
The present invention programs a wireless network analyzer, such as Sniffer® Wireless (a product of Networks Associates Technology, Inc., Santa Clara, Calif. 95054), for example, to process the data or information relative to each frame that is captured or received, for the purpose of accumulating statistical information relative to the wireless network that is being analyzed. The frame data contents are analyzed to provide the statistical information. Other information may also be provided by the hardware or analyzer device received in the data frames. The following Table 2 also provides a description of statistical information items derived from the contents of each frame, provides a description of each item, source of the item, and a flowchart of the variable names associated with the item.
With further reference to
A block diagram of a Sniffer® Wireless System 201 is shown in FIG. 2. As shown, a Wireless LAN 215 that is being analyzed by the Sniffer® Wireless 201 via typically RF Signals 214 received by a Wireless LAN adapter 213. The wireless LAN adapter 213 converts the rf signals to electrical signals, and they are connected via a bus or cable 212 to a driver 207. The hard wire connection 208 connects the driver 207 to memory 205, and via another bus or wired connection 210 to a central processing unit (CPU) 206. The "Sniffer® Kernel Mode Software Process Memory" 205 is also connected via a bus or cable connection 203 to a "Sniffer® Wireless Application" 202. The CPU 206 drives a display 209 for presenting processed frame information to a user, as will be explained. Note that as shown, the "Sniffer® Wireless Application" 202 operates in a "user mode", which is a non-privileged processor mode that applications typically run in. This mode limits the set of available interfaces, and also limits access to system data. Contrary to this, the combination of the CPU 206 and "Sniffer® Kernel Mode Software Process Memory" 205, driver 207, and display 209, are operated in a "kernel mode", which is a privileged mode of code execution via CPU 206, in which the contents of memory of 205 are totally accessible, and all CPU 206 instructions are permitted to be issued. In other words, the operating system code, including system services and device drivers, are run in a kernel mode.
The operation of the invention in the Sniffer® Wireless 103, in this example, will now be described. With reference to the flowchart of
Referring to
Referring to
Referring to
Referring to
Referring to
Referring to
Referring to
Referring to
Referring to
Referring to
Referring to
Referring to
Referring to
Referring to
Referring to
Referring to
Referring to
Referring to
Three different screen displays or dumps arc provided for respective embodiments of the invention, associated in this example, for use in the User Interface of the Sniffer Wireless Dashboard Statistics display.
The screen display 2200 shown in
Note that the present invention as used in Sniffer® Wireless product, is provided via the addition thereto of a 802.11 tab on what is known as a dashboard display. When a user addresses this tab, it permits them to then obtain the aforesaid displays from a menu to visually viewing vital statistical data associated with the Wireless LAN (IEEE 802.11) Topology. By selecting from amongst the displays 2200, 2300, or 2400, the user will be able to troubleshoot various problems that are occurring on the associated Wireless LAN, and can also use the information to improve the efficiency of the Wireless LAN by eliminating excessive overlaps, and by ensuring that access points (AP) are added to areas not presently covered.
With particular reference to the screen display 2400 (see FIG. 24), certain of the information provided will be described. "Data PKTS" are the number of packets transmitted containing only user data (non-management and non-control). "Management Pkts" are the number of packets containing data relating to managing the 802.11 Network. In the display example given, one packet is indicated as representing the sum of all of the data under the "Management" category. "Control Pkts" are the number of packets containing data relating to controlling the Network. The number that is indicated at any given time represents the sum of all of the data under the "Control" category, except for the BSSID and ESSID categories, which are separately indicated in the "Control" column. "WEP Pkts" are the number of packets associated with the Wired Equivalent Privacy (WEP) bits set. "1 MB Pkts, 2 MB Pkts, 5.5 MB Pkts, and 11 MB Pkts", respectively, represent the number of packets transmitted at the indicated respective rates. In the column labeled "Control", the "BSSID" (Basic Service Set identification) is a six byte address of a particular access point. The first three bytes represent the manufacturer ID as designated by the IEEE (Institute of Electrical and Electronic Engineers). The Sniffer® Wireless uses a table lookup to represent a 6 character abbreviation of the manufacturer's name. If the manufacturer's name for the 3 byte manufacturer ID is not present then the 6 hexadecimal characters for the 3 byte value is displayed. The BSSID display represents the field of the last packet analyzed whose 802.11 Type is Management, and whose 802.11 Sub-type is Beacon. The "ESSID" (Extended Service Set Identification) is a thirty-two character field which is the 802.11 network name used to group multiple Access Points represented by multiple BSSID'S into the same logical network. The ESSID display represents the field of the last packet analyzed whose 802.11 Type is Management, and whose Sub-type is Beacon. In the "Management" column, the types of packets being captured is shown by the total number captured at a given time. Note that the "Beacon" chose the number of access points being monitored. Further note that the information shown in the "Statistics, Management, and Control" columns can only be observed from the wireless side via the wireless analyzer being used as programmed with the present invention.
The display screens 2200, 2300, and 2400, are, updated on a predetermined time basis of approximately once per second, in this example. The data used to update the values displayed on the screen are obtained from predetermined locations or assigned locations within a memory of the particular analyzer being used.
The following information is believed helpful in fostering one's understanding of the environment the present invention is used in, and for further illustrating various aspects of the invention. Note that in an IEEE 802.11 MAC (Medium Access Control) Header, a Frame Control Field (FCF) is presented. The FCF contains a type and Sub-type field, for identifying the type of packet. As previously indicated, the packets are typically of three types, Data Packets, Management Packets, and Control Packets.
The function of Management Packets will now be described. IEEE 802.11 Management Frames are defined in Section 7 of the IEEE 802.11 Specification. These frames are used to allow IEEE 802.11 Stations (Access Points and Client Adapters) to exchange management information about the network to ensure that client adapters and access points within the same logical network are able to communicate with one another. For example, a public area such as an airport, may have several logical networks. Typically, a Wireless LAN may be maintained at the airport facility. Airline lounges maintained at the airport for frequent flyers may include a Wireless LAN. Also, it may be possible that a coffee house within the airport facility may have a Wireless LAN. The management frames can be utilized to allow client adapters to associate and communicate on any one or combination of the aforesaid examples of three Wireless LANs, assuming that the users have permission to communicate within one or more of the aforesaid Wireless LANs.
The function of Control Packets is to control the flow of Data Packets within a IEEE 802.11 network. Control packets indicate the successful receipt of information, and provide a method for the wireless stations to access the medium.
Other types of packets as shown in the screen display of
The present invention is primarily designed for application in a Wireless LAN environment. A Wireless LAN dashboard has specific statistics associated with the related operating environment.
A Sniffer® Wireless analyzer, as previously mentioned, is configured to connect to multiple Wireless LAN adapters. Each adapter can monitor a single channel at a time. The channel frequency spectrum and spacings are defined in the IEEE 802.11 Specification Section 15.4.
In the examples given herein, in association with the dashboard of a wireless analyzer, such as the Sniffer® Wireless, it can be used to identify the state of the LAN being monitored. Certain of the information obtained is useful in troubleshooting the associated Network. Other information obtained is useful in identifying the capacity of the network, and its utilization. For example, the identified errors provide information on the total number of bad packets. A Retry Counter (not shown) provides a user with information pertaining to the amount of data that has been resent due to failure of the receiving station to acknowledge the received data. The previously mentioned Speed distribution statistics (1 Mbps, 2 Mbps, 5.5 Mbps, and 11 Mbps) packet counters are used to determine the percentage of data which has been transmitted at each of these speeds. The data throughput indicator provides an indication of the total amount of 11 Mbps available throughput being utilized. The Management Statistics permit a user to determine how many stations are potentially trying to gain access to the LAN being monitored.
Note that only the IEEE 802.11 Data Frames are transmitted to the wired side of an Access Point. All of the IEEE 802.11 Management and Control Frames, Speed Distribution, and IEEE 802.11 errors are not available on the wired side of the LAN being monitored.
An "802.11 TAB" is shown in the screen display of
In the present invention, Set Thresholds are used to set thresholds for alarms. If any of the statistics calculated in the dashboard exceed a specific rate for a given time period, an alarm is generated in an Alarm Log. The statistics provided in the dashboard can be displayed as total amount over the time period since resetting the analyzer to begin a new session, or the statistics can be displayed as an average per second.
Although various of the embodiments of the invention have been shown and described, they are not meant to be limiting. Those of skill in the art may recognize certain modifications to these embodiments, which are meant to be covered by the spirit and scope of the claims appended herewith.
Cafarelli, Dominick Anthony, Anderson, James Peter
Patent | Priority | Assignee | Title |
10021124, | Jul 01 2003 | SecurityProfiling, LLC | Computer program product and apparatus for multi-path remediation |
10050988, | Jul 01 2003 | SecurityProfiling, LLC | Computer program product and apparatus for multi-path remediation |
10104110, | Jul 01 2003 | SecurityProfiling, LLC | Anti-vulnerability system, method, and computer program product |
10154055, | Jul 01 2003 | SecurityProfiling, LLC | Real-time vulnerability monitoring |
10742390, | Jul 13 2016 | Novatek Microelectronics Corp. | Method of improving clock recovery and related device |
6801756, | Feb 08 2002 | McAfee, Inc | Method and system for dynamic evaluation of a wireless network with a portable computing device |
6879812, | Feb 08 2002 | JPMORGAN CHASE BANK, N A ; MORGAN STANLEY SENIOR FUNDING, INC | Portable computing device and associated method for analyzing a wireless local area network |
7024690, | Apr 28 2000 | VALTRUS INNOVATIONS LIMITED | Protected mutual authentication over an unsecured wireless communication channel |
7042852, | May 20 2002 | Extreme Networks, Inc | System and method for wireless LAN dynamic channel change with honeypot trap |
7058796, | May 20 2002 | Extreme Networks, Inc | Method and system for actively defending a wireless LAN against attacks |
7086089, | May 20 2002 | Extreme Networks, Inc | Systems and methods for network security |
7277404, | May 20 2002 | Extreme Networks, Inc | System and method for sensing wireless LAN activity |
7322044, | Jun 03 2002 | Extreme Networks, Inc | Systems and methods for automated network policy exception detection and correction |
7324804, | Apr 21 2003 | Extreme Networks, Inc | Systems and methods for dynamic sensor discovery and selection |
7355996, | Feb 06 2004 | Extreme Networks, Inc | Systems and methods for adaptive monitoring with bandwidth constraints |
7359676, | Apr 21 2003 | Extreme Networks, Inc | Systems and methods for adaptively scanning for wireless communications |
7383577, | May 20 2002 | Extreme Networks, Inc | Method and system for encrypted network management and intrusion detection |
7430198, | May 26 2005 | Symbol Technologies, LLC | RF utilization calculation and reporting method for 802.11 wireless local area networks |
7505595, | Sep 29 2003 | Viavi Solutions Inc | Post capture decryption of wirelessly captured data using multiple keysets |
7522908, | Apr 21 2003 | Extreme Networks, Inc | Systems and methods for wireless network site survey |
7526808, | May 20 2002 | Extreme Networks, Inc | Method and system for actively defending a wireless LAN against attacks |
7532895, | May 20 2002 | Extreme Networks, Inc | Systems and methods for adaptive location tracking |
7577424, | Dec 19 2005 | Extreme Networks, Inc | Systems and methods for wireless vulnerability analysis |
7660892, | Jan 24 2005 | Daintree Networks, Pty. Ltd.; DAINTREE NETWORKS PTY LTD | Network analysis system and method |
7715800, | Jan 13 2006 | Extreme Networks, Inc | Systems and methods for wireless intrusion detection using spectral analysis |
7751393, | Feb 11 2004 | ARISTA NETWORKS, INC | Method and system for detecting wireless access devices operably coupled to computer local area networks and related methods |
7779476, | May 20 2002 | Extreme Networks, Inc | Active defense against wireless intruders |
7792956, | Jan 24 2005 | Daintree Networks, Pty. Ltd.; DAINTREE NETWORKS PTY LTD | Network analysis system and method |
7804808, | Dec 08 2003 | ARISTA NETWORKS, INC | Method and system for monitoring a selected region of an airspace associated with local area networks of computing devices |
7881322, | Dec 16 2002 | RUCKUS IP HOLDINGS LLC | Power-saving mechanism for periodic traffic streams in wireless local-area networks |
7969937, | Mar 23 2004 | Hewlett Packard Enterprise Development LP | System and method for centralized station management |
7970013, | Jun 16 2006 | Extreme Networks, Inc | Systems and methods for wireless network content filtering |
7970894, | Nov 15 2007 | ARISTA NETWORKS, INC | Method and system for monitoring of wireless devices in local area computer networks |
7971251, | Mar 17 2006 | Extreme Networks, Inc | Systems and methods for wireless security using distributed collaboration of wireless clients |
8060939, | May 20 2002 | Extreme Networks, Inc | Method and system for securing wireless local area networks |
8196199, | Oct 19 2004 | AIRDEFENSE, LLC | Personal wireless monitoring agent |
8281392, | Aug 11 2006 | Extreme Networks, Inc | Methods and systems for wired equivalent privacy and Wi-Fi protected access protection |
8370483, | Jan 24 2005 | ALLY BANK, AS COLLATERAL AGENT; ATLANTIC PARK STRATEGIC CAPITAL FUND, L P , AS COLLATERAL AGENT | Network analysis system and method |
8400991, | Feb 13 2004 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | Signaling format for WLANs |
8599743, | Nov 17 2009 | Ricoh Company, Ltd. | Method, apparatus, and system for reducing power consumption in a mesh network |
8687543, | Apr 05 2005 | Cisco Technology, Inc. | Wireless connection selection and setup |
8750272, | Mar 23 2004 | Hewlett Packard Enterprise Development LP | System and method for centralized station management |
8789191, | Feb 11 2004 | ARISTA NETWORKS, INC | Automated sniffer apparatus and method for monitoring computer systems for unauthorized access |
8984644, | Jul 01 2003 | SecurityProfiling, LLC | Anti-vulnerability system, method, and computer program product |
9003527, | Feb 11 2004 | ARISTA NETWORKS, INC | Automated method and system for monitoring local area computer networks for unauthorized wireless access |
9019911, | Mar 23 2004 | Hewlett Packard Enterprise Development LP | System and method for centralized station management |
9019944, | Jul 28 2009 | Koninklijke Philips Electronics N V | Diagnosing and resolving wireless network malfunctions |
9100431, | Jul 01 2003 | SecurityProfiling, LLC | Computer program product and apparatus for multi-path remediation |
9117069, | Jul 01 2003 | SecurityProfiling, LLC | Real-time vulnerability monitoring |
9118708, | Jul 01 2003 | SecurityProfiling, LLC | Multi-path remediation |
9118709, | Jul 01 2003 | SecurityProfiling, LLC | Anti-vulnerability system, method, and computer program product |
9118710, | Jul 01 2003 | SecurityProfiling, LLC | System, method, and computer program product for reporting an occurrence in different manners |
9118711, | Jul 01 2003 | SecurityProfiling, LLC | Anti-vulnerability system, method, and computer program product |
9191883, | Apr 05 2005 | Cisco Technology, Inc. | Wireless connection selection and setup |
9225686, | Jul 01 2003 | SecurityProfiling, LLC | Anti-vulnerability system, method, and computer program product |
9350752, | Jul 01 2003 | SecurityProfiling, LLC | Anti-vulnerability system, method, and computer program product |
9407732, | Nov 26 2012 | Intel Corporation | Methods and arrangements to decode communications |
9432848, | Mar 23 2004 | Hewlett Packard Enterprise Development LP | Band steering for multi-band wireless clients |
9479406, | Aug 22 2013 | EXFO SOLUTIONS SAS | Displaying signal flows in network analysis tool |
Patent | Priority | Assignee | Title |
5757772, | Sep 18 1995 | WILKINSON, WILLIAM T | Packet switched radio channel traffic supervision |
5799154, | Jun 27 1996 | Verizon Patent and Licensing Inc | System and method for the remote monitoring of wireless packet data networks |
5912921, | Aug 20 1997 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | Concurrent multiple data rate communications in a wireless local area network |
6363384, | Jun 29 1999 | WANDEL & GOLTERMANN TECHNOLOGIES, INC | Expert system process flow |
6396287, | Sep 02 1998 | Anritsu Company | Process for measuring output harmonic relative to output fundamental with enhanced accuracy |
6427165, | Nov 18 1998 | Gateway, Inc | Method and apparatus for information retrieval from a network using parameter value sampling |
6526044, | Jun 29 1999 | WANDEL & GOLTERMANN TECHNOLOGIES, INC | Real-time analysis through capture buffer with real-time historical data correlation |
6529954, | Jun 29 1999 | WANDEL & GOLTERMANN TECHNOLOGIES, INC | Knowledge based expert analysis system |
20020152303, | |||
20020186660, | |||
20030012163, | |||
EP1280296, | |||
WO2071627, | |||
WO3025597, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Sep 13 2001 | CAFARELLI, DOMINICK A | NETWORKS ASSOCIATES TECHNOLOGY, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 012410 | /0544 | |
Sep 13 2001 | ANDERSON, JAMES P | NETWORKS ASSOCIATES TECHNOLOGY, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 012410 | /0544 | |
Sep 17 2001 | Networks Associates Technology, Inc. | (assignment on the face of the patent) | / | |||
Nov 19 2004 | NETWORKS ASSOCIATES TECHNOLOGY, INC | McAfee, Inc | MERGER SEE DOCUMENT FOR DETAILS | 019843 | /0528 |
Date | Maintenance Fee Events |
May 15 2007 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Mar 04 2011 | ASPN: Payor Number Assigned. |
Mar 04 2011 | RMPN: Payer Number De-assigned. |
Oct 10 2011 | REM: Maintenance Fee Reminder Mailed. |
Oct 25 2011 | M1555: 7.5 yr surcharge - late pmt w/in 6 mo, Large Entity. |
Oct 25 2011 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
May 17 2013 | ASPN: Payor Number Assigned. |
May 17 2013 | RMPN: Payer Number De-assigned. |
Oct 02 2015 | REM: Maintenance Fee Reminder Mailed. |
Feb 24 2016 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Feb 24 2007 | 4 years fee payment window open |
Aug 24 2007 | 6 months grace period start (w surcharge) |
Feb 24 2008 | patent expiry (for year 4) |
Feb 24 2010 | 2 years to revive unintentionally abandoned end. (for year 4) |
Feb 24 2011 | 8 years fee payment window open |
Aug 24 2011 | 6 months grace period start (w surcharge) |
Feb 24 2012 | patent expiry (for year 8) |
Feb 24 2014 | 2 years to revive unintentionally abandoned end. (for year 8) |
Feb 24 2015 | 12 years fee payment window open |
Aug 24 2015 | 6 months grace period start (w surcharge) |
Feb 24 2016 | patent expiry (for year 12) |
Feb 24 2018 | 2 years to revive unintentionally abandoned end. (for year 12) |